ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-57F5B10A6959
|
Infrastructure Scan
ADDRESS: 0xacd9234e1136f40563d4fc37ba392dea93368e45
DEPLOYED: 2026-04-29 06:38:47
LAST_TX: 2026-04-29 07:19:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 7 public, 4 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc44c42f4f421be6baf778f1e470f8d17ced9bb58 0x5139ef100ae31ee176f8679642d09f7a9f819d12 0x4293ffef63de21c9f1d11233a4fd357d5a0788b8 0xbf9454335b95baa01be52e6e72e76208a2aabca7 0xadd6dbb8262bb49c8b30212e740f1204ca44a82c 0xf58163ff379afb8072674d73c114743705f71128 0xf769210395743a23561a171fac391689b1cacfe7 0xd16b4567366e61e60f5094f8ba55d5f9e2a4f7ed 0x7b93f915ac1d04dea24ea48f36e8f546ae05201c 0x6ea89b4290285c32fb36b6c372abdea35b21e458 0xbe526bd95cfeda793f559f2d829defe38ac6e203 0xcb0f61c691e9de53764f8dae42e861a29f93cff0 0xfdbb3011a1324229ba417a2232189d44d440faeb 0x4e777f5a30ea1766ebb400e855855557ecb21459 0x7dbd20a660a37de90dce25e3286f2a341efc6f8a 0x17b488f07f8a3dda541fe659971e9989ac5e7b59 0x507182e3ebacfc0ee116ce0dc1b5dc768eb15245 0xda1e75b88e4b970c9431ca71b59116364e396b88 0xc604a53577b1318dfdeaf677b0f21f90c4037ffc 0x0dfc52f032072a9f1a95bf3be250512fcb42d868
